iText needs BC but it's possible to bypass it and create an external
signature (a complete CMS or CAdES) using whatever means available. If
using the iText signature code the provider can be explicitly selected
or the selection will be done using the normal Java mechanism as mkl
and Andreas already said. I admit that an interface for the hash
functions may make some sense, the signature is already taken care in
the ExternalSignature interface.

Paulo

On Thu, Jul 12, 2012 at 11:03 AM, mkl <[email protected]> wrote:
> zouzou,
>
> As Andreas already said, currently you should just accept that iText is
> built to use BC.
>
> zouzou wrote
>> What are best practices for using iText-5.3.0 with another provider for
>> that BC sign with SHA256?
>
> Currently BC is hardwired in some iText classes. The existence of a number
> of method overloads with an additional provider argument is a hint, though,
> that iText aims at providing the covered functionality with other security
> providers, too. I don't know how far this support already works.
>
> zouzou wrote
>> In the previous post to answer me you talked about overload functions,
>> what are these functions?
>
> Overloaded methods are methods of the same class with the same name but
> different parameter types, e.g. KeyStoreUtil.loadCacertsKeyStore(String) and
> KeyStoreUtil.loadCacertsKeyStore().
>
> zouzou wrote
>> If one has no choice to use another provider than BC when or in what place
>> should add?
>
> Unless some other code in your program time and time again changes the list
> of registered security providers, doing it once during startup should
> suffice. Wheter or not BC needs to be at a special position in that list,
> depends on the requirements of all the components of your program making use
> of security provider functions. Sometimes it's quite a hassle to put them in
> the right order... ;)
>
> Regards,   Michael
>
> --
> View this message in context: 
> http://itext-general.2136553.n4.nabble.com/iText-and-signing-pdf-fils-tp4655392p4655593.html
> Sent from the iText - General mailing list archive at Nabble.com.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to